Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
that
know
security
EBOOK
SECURITY
Preface
Section 1
Know the lay of the land
p/ 03
Section 2
Know your VULNERABILITies
Financially-motivated criminals will naturally
seek out data that is easily converted to cash,
such as bank information and payment cards,
while espionage groups target internal
corporate data and trade secrets.
Verizon, 2014 Data Breach Investigations Report
According to Forrester,
46% of businesses
plan to increase their
security budgets on
network defenses
during 2014. Its also
reported that the focus
will be on counterthreat measures, such
as intelligence services,
wireless security, nextgeneration firewalls
and malware detection.
(Source: Understand
The State Of Network
Security: 2013 To 2014,
Forrester Research, Inc.,
January 6, 2014).
That doomsday
scenario could well
come true for the
unprepared, the
under-invested and the
misinformed enterprises
that are held back
by sub-par network,
data center and cloud
infrastructures. After
all, these are the types
of organizations that
cybercriminals prey upon
time and time again. If
the economics stack up,
why wouldnt they?
p/ 05
Insiders, hackers
and ineffective
security solutions
Social,
big data, mobility
and cloud
End users
and end
points
Ineffective
traditional
controls
p/ 07
Section 3
Know your opportunities
The hacker market once a varied
landscape of discrete, ad hoc networks of individuals
initially motivated by
little more than ego
Corporates need to
and notoriety - has
look at the actual
emerged as a
bang-for-the-buck
playground of
they are receiving
financially driven,
from their IT security highly organized
systems. They also
and sophisticated
need to remove
groups.
the old layers of
technology and
refresh their security."
Passive defenses such as simply monitoring and/
or blocking traffic are important, but are no longer
enough. Instead, firms should be looking to deploy
a strategy that disrupts the economic benefits of
hacking. In short, hitting them where it hurts
in the pocket.
Enterprises that can impose an active defense
utilizing proactive blocking techniques are well
positioned to make hacking more expensive and
time consuming for the intruder. And, in doing so,
either deflecting their attentions away from your
perimeter or nullifying their behavior entirely.
Juniper Networks
Decentralized Policy
ManagementAs the
number of firewalls
increase across your
network and you need
consistent policies
across the firewall
estate, a reliable,
centralized web-based
management solution is
critical.
This is just one example
of the agility you can get
from a high level
of security intelligence.
The ability to make
security decisions on
the fly, based on new
information, will be
a critical defensive
weapon against
cybercriminals. Knowing
other dynamic security
information such as
updated command
and control centers (to
defend against botnets),
up-to-the-second worm
and virus signatures,
or customized feeds
focused on a companys
vertical businesses
can all be critical
to protecting your
business.
p/ 09
Pure-play vendors provide only one part of the solution, meaning businesses
tend to have more than one throat to choke when it comes to security and
networking. As firms ratchet services up and down across multiple environments
with more speed than ever before, its important to be able to manage multiple
security gateways and devices such as firewalls, routers and switches using
a common platform.
The modern enterprise needs to grow its security as its network grows, ensuring
that they have a scalable, next-generation firewall to defend its servers.
A firewall that delivers without compromising business continuity. A firewall
that can detect threats based on correlation of data using smart analytics.
A firewall that can identify attackers and determine the nature of the threat.
Most of all, firms that are serious about lowering costs and improving business
agility need to better understand what their future needs are. Not just put up
with a "make do and mend" mentality that holds the business back and opens
the door to further security breaches and damaging downtime.
22%
of organizations
technology
investments
will be allocated
to security.
p/ 11
Section 4
Know your checklist
What are the key attributes to look for when building a
secure network?
Reliable and secure hardware using open interfaces and standard protocols
Ability to protect traffic at high speeds
Programmable hardware that adapts to changes
Ability to alter throughput, latency and connectivity
Layered security in the network, firewall, and application
Policy management for physical and virtual environments
One operating system and language across security and network
Network and security automation through APIs
High resiliency due to separate data and control pane architecture
Protection of traditional and virtual workloads
Ability to add modules to expand security capacity and functionality without rip and replace
p/ 13
1119 PZ Schiphol-Rijk
or +1.408.745.2000
Phone: +31.0.207.125.700
Fax: +1.408.745.2100
Fax: +31.0.207.125.701
www.juniper.net
Copyright August 2014, Juniper Networks, Inc. All rights reserved. Juniper Networks, the Juniper
Networks logo, Junos and QFabric are registered trademarks of Juniper Networks, Inc. in the
United States and other countries. All other trademarks, service marks, registered marks, or
registered service marks are the property of their respective owners. Juniper Networks assumes
no responsibility for any inaccuracies in this document. Juniper Networks reserves the right to
change, modify, transfer, or otherwise revise this publication without notice.